Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This noncompliant code example accepts a tained filename argument. An adversary could may supply the name of a sensitive password file, complete with the path and consequently force operations to be performed on the wrong file.

...